International Conference on Computing, Mechanical and Electronics Engineering (ICCMEE'2015) July 9-10, 2015 Singapore An Offline Transferable and Divisible Mobile Coupon based on NFC JiaNing Luo, and MingHour Yang In 2009, Hsiang et al. [10] proposed a secure M-coupon scheme that applies a quadratic residue theorem and hash function and NFC as a channel for transactions. In 2012, Sánchez-Silos et al. [14] proposed the WingBonus system, which uses NFC-equipped mobile devices for accessing, storing, managing, and redeeming mobile coupons. In 2010, Hsueh et al. [11] proposed an M-coupon sharing protocol that applies a word-of-mouth marketing strategy based on public key infrastructure and digital signature. Through this protocol, issuers generate original and recommended M-coupons to M-coupon owners. In addition to using existing M-coupons, owners can transfer the recommended M-coupons through word of mouth to other users, thereby increasing M-coupon usage. Among various M-coupon solutions, several researchers have not provided user identity protections [6], [9], [11], [17]– [18] or coupon transfer functions [9]–[10]. To enhance coupon protection, an NFC-based M-coupon scheme, which enables offline transfer and division functions, was proposed. A PayWord-based dual hash chain was used for providing the transfer and division functions. One-time certificates issued by trusted third parties (TTPs) and SEs in NFC cell phones were incorporated to support unlinkable, offline transferable, and divisible M-coupons. Abstract—Researchers have proposed integrating vouchers with NFC-equipped cell phones. This study proposes an NFC-based offline transferable and divisible coupon scheme. Users can transfer the unused portions of M-coupons to other users. In this method, PayWord’s dual hash chain was used for transferring and dividing M-vouchers and adding trusted third party-issued one-time passwords (One-time-certificate) and secure elements in the NFC cell phones to provide unlinkable, offline transferable, and divisible M-coupons functions. This scheme comprised the following features: 1) unlinkability, 2) offline transferability, 3) divisibility, and 4) redeemability. Using One-time-certificate, adversaries cannot trace user identity from the coupon contents. By using one-time-certificate obtained in advance through registration from trusted third parties, users can transfer or redeem the M-coupons without connecting to the issuers. When users have multiple vouchers, they may selectively make partial transfers to other users. In addition, users may redeem discounts using self-purchased or transferred coupons. Keywords—Divisible, mobile coupon (M-coupon), near-field communication (NFC), offline transfer, unlinkability. I. INTRODUCTION OUPONS [1] are vendors’ crucial advertisement and sales instruments, which can be further divided into ordinary coupons and vouchers [2]. Numerous researchers have proposed mobile coupon (M-coupon) technologies that enable coupon downloads on mobile devices [3]–[18]. Among these, some used near-field communication (NFC), which is a short-distance wireless communication technology [3], [7], [9]–[10]. In 2006, Chang et al. [6] proposed an M-coupon system using the symmetric encryption technique. In Chang’s system, users can transfer M-coupons to other users, but coupon transfers and redemptions must be processed through the issuers. However, Chang’s protocol is a target of man-in-the-middle attack; moreover, existing owners may preferentially redeem their coupons during redemption processes. In 2007, Dominikus et al. [9] proposed an NFC-based M-coupon system. M-coupons can be obtained by accessing NFC tags on posters or advertisements by using NFC-equipped mobile devices. This protocol prevents forging, double-spending, and tempering but does not include the functions of user anonymity and coupon transferability and traceability. C II. NEAR-FIELD COMMUNICATION-BASED OFFLINE TRANSFERABLE AND DIVISIBLE MOBILE-COUPONS The offline-transfer M-coupon scheme proposed in this study was divided into four stages: 1) registration, 2) purchase, 3) transfer, and 4) authentication, as shown in Fig 1. First, all users must obtain One-time-certificate for their cell phones from TTPs and register. Next, users may purchase M-coupons from issuers and download them to their cell phones. Subsequently, users may make partial M-coupon transfers to other users or redeem their coupons from vendors under offline conditions. Finally, vendors authenticate the redeemed M-coupons with the issuers. The systematic roles comprised the following: TTPs are responsible for managing user lists. Users and cell phone SEs are listed correspondingly, and One-time-certificate are issued. Issuers are responsible for distributing M-coupons to users. Vendors are responsible for redeeming user’s M-coupons. Users refer to the owners and users of NFC cell phones. SEs are secure storage spaces provided in the cell phones used for encryptions and key generations. JiaNing Luo is with the Information and Telecommunications Engineering department, Ming Chuan University, Taoyuan, Taiwan. MingHour Yang was with the Information Computer Science department, Chung Yuan Christian University, Taoyuan, Taiwan. http://dx.doi.org/10.15242/IIE.E0715023 17 International Conference on Computing, Mechanical and Electronics Engineering (ICCMEE'2015) July 9-10, 2015 Singapore each identification code and does not include the users’ and SEs’ identity information. Finally, TTPs generate the hash chain authentication values (𝑠 ) for the maximum permitted coupons that authenticated users may transfer. The detailed steps are described as follows: Step 1: The key pair PKT1 and SKT1 is generated from the SE for the one-time-certificate, communication key KS (shared with TTPs), and random number Nonce1. Step 2: The key SKA is used by the SE to encrypt user identification IDA, one-time-certificate public key PKT1, symmetric key KS, and random number Nonce1. SKT1 is used to sign user identification IDA, communication key KS, and random number Nonce1. The two messages are subsequently combined to generate M2, which is sent to the TTPs. Step 3: After TTPs receive M2, CertT1 is generated and comprises the one-time-certificate identification code IDT1, one-time-certificate public key (PKT1), and time limit of the One-time-certificate (TLT1). Step 4: The TTPs then send CertT1 to the SE. 1. Registration 2. Purchase 3. Offline Transfer 4. Offline Redemption TTP NFC Phone A 1,2 2 User A 1,2,3,4 2 SEA Issuer 3 4 NFC Phone B User B 4 3 SEB Merchant Fig.1 Offline Transfer System Architecture During initialization, TTPs, issuers, vendors, users, and SEs each have a unique identification code ( , , , and ) and a set of asymmetric keys ( and ). In this study, the identities are assumed authenticated between each role during connection processes and all messages are transferred in secure channels. The symbols used in this study are defined in Table 1. 𝑖 𝑖 𝐶𝑒𝑟𝑡𝑖 𝐶𝑒𝑟𝑡 𝑖 𝑖, 𝑖 𝑖,𝑗 𝑖𝑔𝑛( 𝑖 , 𝑀) 𝐸( 𝑖 , 𝑀) ( 𝑖 , 𝑀) 𝑁𝑜𝑛𝑐𝑒𝑎 𝐻() 𝐶𝑜𝑢𝑝𝑜𝑛𝑖 𝑁 𝑇𝑟𝑎𝑛𝑠𝑓𝑒𝑟𝐿𝑜𝑔 𝐿𝑜𝑔𝑀 B. PURCHASE STAGE At the purchase stage, users obtain M-coupons from issuers and store them in the SEs of their cell phones. The detailed procedure is specified as follows: Step 1: User A encrypts IDT1, the number of M-coupons (n), and 𝑁𝑜𝑛𝑐𝑒 using the key ( , ) shared with the issuer to generate message 𝑀 , which is sent with CertT1 to the i s s u e r . Step 2: The issuer uses , and the decryption message 𝑀 to generate 𝑁𝑜𝑛𝑐𝑒 . 𝑁𝑜𝑛𝑐𝑒 is then used to generate the serial number SNT1 and payword wn. In addition, CouponT1 is generated and comprises the M-coupon serial number SNT1, one-time-certificate identification code IDT1, number of M-coupons n, and payword wn. Next, is used to encrypt CouponT1, 𝑁𝑜𝑛𝑐𝑒 , and 𝑁𝑜𝑛𝑐𝑒 to generate and send 𝑀 to User A. Step 3: User A uses the secret key of the user’s one-time-certificate , decryption message 𝑀 , and authenticates 𝑁𝑜𝑛𝑐𝑒 . After using 𝑁𝑜𝑛𝑐𝑒 and encrypting , , User A generates message 𝑀 , which is sent to the issuer. Subsequently, the issuer uses , to decrypt 𝑀 and authenticate 𝑁𝑜𝑛𝑐𝑒 . TABLE I NOTATIONS the systematic roles; comprising the TTP, issuer, vendor, user, and SE the identification code of role i the certification of role i the one-time-certificate (one-time certificate) of role i the public and secret keys of role i the stage key between role i and system j the function of using role i’s secret key for signing message M the function of using role i’s key 𝑖 for encrypting message M the function of using role i’s key 𝑖 for decrypting message M random number a symmetric key shared by SE and TTP one-way hash function dual signature role i’s M-coupon the serial number of the M-coupon the transfer log of M-coupons partial message in the M-coupon transfer log C. OFFLINE TRANSFER STAGE In the offline transfer stage, the original owners of the M-coupons generate M-coupons for other users (or vendors) according to the paywords and quantity-based hash chain authentication values. These coupons can be passed on to subsequent users. Through the one-way hash function, User A generates new paywords for Users B and C by using unused paywords and the hash chain authentication values for the number of coupons currently transferred from authenticated users to other users. Furthermore, User B can use the identical method to generate new paywords to User D. A. REGISTRATION STAGE During registration, users register to bind user identifications to cell phone SEs through TTPs and obtain a One-time certificate. Users send request messages and personal identification codes to SEs in which sets of keys and user–SE binding signatures used for the certificate are generated. Through mutually certified secure channels, the public keys and signatures of certificate are sent to TTPs for registration to confirm the current cell phone users. After registration, TTPs generate and return the certificate (𝐶𝑒𝑟𝑡 ) to the cell phones. This certificate comprises only one corresponding public key to http://dx.doi.org/10.15242/IIE.E0715023 18 International Conference on Computing, Mechanical and Electronics Engineering (ICCMEE'2015) July 9-10, 2015 Singapore Step 9: After receiving 𝑀 , User B uses to decrypt 𝑀 and authenticate 𝑁𝑜𝑛𝑐𝑒 . User B then obtains 𝐿𝑜𝑔𝑀 from 𝐿𝑜𝑔𝑀 and hashes (one-way) the hashed 𝐿𝑜𝑔𝑀 and 𝑒𝑞𝑢𝑒𝑠𝑡 and authenticates whether the results match . D. OFFLINE REDEMPTION STAGE At the offline redemption stage, vendors authenticate M-coupons with issuers. The detailed steps are specified as follows: Step 1: The vendor sends 𝐶𝑜𝑢𝑝𝑜𝑛 and 𝑇𝑟𝑎𝑛𝑠𝑓𝑒𝑟𝐿𝑜𝑔 to the issuer. Step 2: The issuer obtains 𝐿𝑜𝑔𝑀 from 𝑇𝑟𝑎𝑛𝑠𝑓𝑒𝑟𝐿𝑜𝑔 , from which 𝐿𝑜𝑔𝑀 can be derived. Subsequently, after decryption using the key shared with User B ( , ), the vendor’s authenticated identification code ( ), payword for the currently used numbers of coupons and coupon transfers ( 𝑘 𝑗 ), payword for the currently used numbers of coupons ( 𝑘 ), number of coupons currently transferred to others ( ), and hash chain authentication value for the number of coupons currently transferred to others (𝑠𝑘 ) are hashed. Next, one-way hash is performed with 𝐿𝑜𝑔𝑀 to authenticate whether the results match the dual signature . Step 3: The issuer obtains 𝑇𝑟𝑎𝑛𝑠𝑓𝑒𝑟𝐿𝑜𝑔 and 𝐿𝑜𝑔𝑀 from 𝑇𝑟𝑎𝑛𝑠𝑓𝑒𝑟𝐿𝑜𝑔 and 𝑇𝑟𝑎𝑛𝑠𝑓𝑒𝑟𝐿𝑜𝑔 , respectively, and decrypts 𝐿𝑜𝑔𝑀 by using , . Next, , 𝑘 𝑖, 𝑘, , and 𝑠𝑘 are hashed. One-way hash is then performed with 𝐿𝑜𝑔𝑀 to authenticate whether the results match . Step 4: In this step, the number of coupon transfers (𝑖 and ) are verified to determine whether they exceed the number of redemptions. Fig. 2. Offline Redemption Architecture. At the offline transfer stage, User A can divide and transfer parts of the M-coupons to User B or redeem them from vendors. The detailed steps are specified as follows: Step 1: User A transfers the personal identification code and 𝐶𝑒𝑟𝑡 to User B. Step 2: User B generates the personal one-time-certificate identification code , number of M-coupon transfers 𝑖, 𝑁𝑜𝑛𝑐𝑒 , and 𝐶𝑒𝑟𝑡 to User A. Step 3: User A generates 𝑁𝑜𝑛𝑐𝑒 , 𝑁𝑜𝑛𝑐𝑒 , and a new serial number 𝑁 . In addition, User A adds the paywords for the current number of coupons used and for the sum of the current number of coupons used and transferred ( 𝑘 and 𝑘 𝑖 ) as well as the hash chain authentication value for the current number of coupons transferred to others (𝑠𝑘 ) through one-way hash to generate a new payword for the previous number of coupons ( 𝑖 ). Subsequently, User A uses the new serial number 𝑁 , User B’s identification code , number of coupon transfers 𝑖, and new payword for the previous number of coupons 𝑖 to generate the new 𝐶𝑜𝑢𝑝𝑜𝑛 . Step 4: User A uses , 𝑘 𝑖 , 𝑘 , and the current number of coupon transfers and the hash chain authentication value thereof 𝑠𝑘 to generate message 𝐿𝑜𝑔𝑀 through one-way hash. User A then computes the request message 𝑒𝑞𝑢𝑒𝑠𝑡 through one-way hash to generate message 𝐿𝑜𝑔𝑀 . Step 5: User A hashes (one-way) and signs 𝐿𝑜𝑔𝑀 and 𝐿𝑜𝑔𝑀 to generate the dual signature . Step 6: User A uses , to encrypt , 𝑘 𝑖 , 𝑘 , , 𝑠𝑘 , , and 𝐿𝑜𝑔𝑀 and generate message 𝐿𝑜𝑔𝑀 . Step 7: User A uses 𝐿𝑜𝑔𝑀 , 𝐿𝑜𝑔𝑀 , , and 𝐶𝑒𝑟𝑡 to generate message 𝐿𝑜𝑔𝑀 and then uses 𝑁 , 𝑁 , and the signature for the newly hashed 𝐶𝑜𝑢𝑝𝑜𝑛 to generate 𝑇𝑟𝑎𝑛𝑠𝑓𝑒𝑟𝐿𝑜𝑔 . Step 8: User A uses users’ public key to encrypt 𝐶𝑜𝑢𝑝𝑜𝑛 , 𝑇𝑟𝑎𝑛𝑠𝑓𝑒𝑟𝐿𝑜𝑔 , 𝑁𝑜𝑛𝑐𝑒 , and calculated 𝑁𝑜𝑛𝑐𝑒 (𝑁𝑜𝑛𝑐𝑒 ) to generate and send 𝑀 to User B. http://dx.doi.org/10.15242/IIE.E0715023 III. SECURITY ANALYSIS This section presents an analysis of the security of the proposed method. Unlinkability: At the purchase and transfer and redemption stages, users purchase M-coupons by using One-time-certificate, which comprise only one-time-certificate identification codes and public keys and exclude user and SE identity information. Therefore, adversaries cannot trace user identities from coupon contents. Offline transferability: Both transaction parties use the SEs in NFC through TTP-issued one-time-certificate secret keys to generate new M-coupons. Therefore, coupon owners can authenticate and transfer coupons through One-time-certificate under offline conditions. Divisibility: During the offline transfer stage, users use paywords and s_k to generate new paywords and use dual signatures to enable issuers to trace the sources of coupon transfers. Verifiability: At the purchase stage and online transfer and redemption stage, coupon issuance requires the signing of issuers. Therefore, anyone can authenticate the legitimacy of M-coupons. During offline transfer and redemption, the original coupon owners use secret keys for signing and issuing M-coupons, which are legitimized through one-time-certificate authentication. 19 International Conference on Computing, Mechanical and Electronics Engineering (ICCMEE'2015) July 9-10, 2015 Singapore Forgery prevention: During the purchase stage and online coupon transfer and redemption stages, issuers have the only secret keys to sign and issue M-coupons. Therefore, M-coupons cannot be forged. In offline transfer and redemption, M-coupons are issued by the original coupon owners, who own the only secret keys to one-time signatures and coupon issuance. Therefore, M-coupons cannot be forged under offline conditions either. Double-spending prevention: During the online transfer and redemption stages, the processes must be completed through the issuers; therefore, issuers may prevent transferrers and redeemers from double-spending. Under offline conditions, coupon transfers and redemption bypass the issuers, but new M-coupons must be signed through One-time-certificate. Double-spending can be identified when reconnected to issuers. Tempering: During the purchase stage, issuers determine whether the purchase-related information message digests and order-related information hash values agree with the dual signatures, and TTPs determines whether the purchase-related information hash values and order-related information message digests agree with the dual signatures. Tempered information is deemed to fail in this verification process. In coupon transfer and redemption, M-coupons are signed through the issuers or user One-time-certificate; therefore, coupon tempering can be verified. Nonrepudiation: Both parties during coupon transfers have records of one-time-certificate exchanges; therefore, they cannot deny actions performed in previous transactions. [3] [4] [5] [6] [7] [8] [9] [10] [11] III. CONCLUSION [12] In this study, a PayWord-based dual hash chain was integrated with NFC-equipped mobile devices to provide a scheme capable of making offline transfers and dividing M-coupons. NFC exhibits the convenience of data transfer through touch-interaction of NFC-equipped devices. By using these devices, users may purchase M-coupons from issuers and redeem coupons from vendors. Moreover, they may fully or partially transfer their M-coupons to other users. In this method, users purchase, redeem, and transfer M-coupons by using OTPs obtained from TTPs, who have strict access to the user identities, thereby achieving unlinkability. The application of this method was based on PayWord’s dual hash chain. In addition, SEs from NFC cell phones were added to provide the transferability and divisibility of M-coupons. When disputes occur during transaction processes, exchange records can be traced through TTPs, thereby reinforcing nonrepudiation. This method stimulates the willingness of consumers to consume by using M-coupons and promotes issuers’ and vendors’ increased revenues, thereby providing mutually beneficial effects. [13] [14] [15] [16] [17] [18] [19] REFERENCES [1] [2] M. Kumar, A. Rangachari, A. Jhingran, and R. Mohan, “Sales promotions on the internet,” 3rd USENIX workshop on Electronic Commerce, Boston, pp. 167-176, 1998. F. Borrego-Jaraba, P. C. Garrido, G. C. García, I. L. Ruiz, and M. Á. Gómez-Nieto, “A Ubiquitous NFC Solution for the Development of Tailored Marketing Strategies Based on Discount Vouchers and Loyalty http://dx.doi.org/10.15242/IIE.E0715023 [20] 20 Cards,” in Sensors, Vol. 13(5), pp. 6334-6354, 2013. M. Aigner, S. Dominikus, and M. Feldhofer, “A System of Secure Virtual Coupons Using NFC Technology,” 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 362-366, 2007. http://dx.doi.org/10.1109/percomw.2007.15 A. Alshehri, J. A. Briffa, S. Schneider, and S. Wesemeyer, “Formal security analysis of NFC M-coupon protocols using Casper/FDR,” 5th International Workshop on Near Field Communication (NFC), pp. 1-6, 2013. http://dx.doi.org/10.1109/nfc.2013.6482439 F. Armknecht, A. N. E. B., H. Löhr, M. Manulis, and A.-R. Sadeghi, “Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly,” in Information Security Practice and Experience, L. Chen, Y. Mu, and W. Susilo, Editors, Springer Berlin Heidelberg, pp. 29-44, 2008. C. C. Chang, C. C. Wu, and I. C. Lin, “A Secure E-coupon System for Mobile Users,” in International Journal of Computer Science and Network Security, Vol. 6(1), pp. 273-279, 2006. [7] H.-C. Cheng, J.-W. Chen, T.-Y. Chi, and P.-H. Chen, “A generic model for NFC-based mobile commerce,” 11th International Conference on Advanced Communication Technology, pp. 2009-2014, 2009. [8] G. V. Damme, K. M. Wouters, H. Karahan, and B. Preneel, “Offline NFC payments with electronic vouchers,” in Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds pp. 25-30, 2009. [9] S. Dominikus and M. Aigner, “mCoupons: An Application for Near Field Communication (NFC),” 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 421-428, 2007. [10] H.-C. Hsiang, H.-C. Kuo, and W.-K. Shih, “A secure mCoupon scheme using near field communication,” in International Journal of Innovative Computing, Information and Control, Vol. 5(11 (A)), pp. 3901-3909, 2009. S.-C. Hsueh and J.-M. Chen, “Sharing secure m-coupons for peer-generated targeting via eWOM communications,” in Electronic Commerce Research and Applications, Vol. 9(4), pp. 283-293, 2010. http://dx.doi.org/10.1016/j.elerap.2010.01.002 A. P. Isern-Deya, M. F. Hinarejos, J.-L. Ferrer-Gomila, and M. Payeras-Capellà, “A Secure Multicoupon Solution for Multi-vendor Scenarios,” IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 655-663, 2011. H. Meng and D. Zhang, “Research on the digital coupon of mobile two-dimensional code based on RSA digital signature,” Second International Conference on Computational Intelligence and Natural Computing Proceedings (CINC), pp. 368-371, 2010. J. J. Sánchez-Silos, F. J. Velasco-Arjona, I. L. Ruiz, and M. Á. Gómez-Nieto, “An NFC-Based Solution for Discount and Loyalty Mobile Coupons,” 4th International Workshop on Near Field Communication (NFC), pp. 45-50, 2012. L. Xin and X. Qiu-liang, “Practical compact multi-coupon systems,” IEEE International Conference on Intelligent Computing and Intelligent Systems, pp. 211-216, 2009. B. Zhang, J. Teng, X. Bai, Z. Yang, and D. Xuan, “P 3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution,” IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 93-101, 2011. http://dx.doi.org/10.1109/PERCOM.2011.5767599 C. -K. Chang, “An Improved E-Coupon Scheme and Its Extension to E-Gift Certificate,” Master’s Thesis, Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan, 2007. Y. -J. Lai, “Transferable Valued Coupon for Mobile Applications,” Master’s Thesis, Department of Information Management, National Taiwan University of Science and Technology, Taipei, Taiwan, 2012. R. Rivest and A. Shamir, “PayWord and MicroMint: Two simple micropayment schemes,” in Security Protocols, M. Lomas, Editor, Springer Berlin Heidelberg, pp. 69-87, 1997. K. Sunhyoung and L. Wonjun, “A pay word-based micropayment protocol supporting multiple payments,” The 12th International Conference on Computer Communications and Networks, pp. 609-612, 2003. http://dx.doi.org/10.1109/icccn.2003.1284234
© Copyright 2026 Paperzz